General

  • Target

    6473faaad6fa903ecd0784f51ed2faedffb2f740a907842a6af8e38fc89df659

  • Size

    109KB

  • Sample

    240419-b4t28adb43

  • MD5

    b2a1825ace4adfb4bf932400d988876b

  • SHA1

    43b343fe8d36d5392293e5061039715d15156ffb

  • SHA256

    6473faaad6fa903ecd0784f51ed2faedffb2f740a907842a6af8e38fc89df659

  • SHA512

    54562e54131fbe622b4565572bed430b7cfbb90afc0bc0445c1e7ef5db855d466def3900a2a753b67d11e84ed03118db11888538ea54e23365577c065a517dc0

  • SSDEEP

    3072:YKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgiMjmwHAfvperDmI:YKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgi+

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://decinfo.com.br/s4hfZyv7NFEM/y9.html

xlm40.dropper

https://imprimija.com.br/BIt2Zlm3/y5.html

xlm40.dropper

https://stunningmax.com/JR3xNs7W7Wm1/y1.html

Targets

    • Target

      6473faaad6fa903ecd0784f51ed2faedffb2f740a907842a6af8e38fc89df659

    • Size

      109KB

    • MD5

      b2a1825ace4adfb4bf932400d988876b

    • SHA1

      43b343fe8d36d5392293e5061039715d15156ffb

    • SHA256

      6473faaad6fa903ecd0784f51ed2faedffb2f740a907842a6af8e38fc89df659

    • SHA512

      54562e54131fbe622b4565572bed430b7cfbb90afc0bc0445c1e7ef5db855d466def3900a2a753b67d11e84ed03118db11888538ea54e23365577c065a517dc0

    • SSDEEP

      3072:YKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgiMjmwHAfvperDmI:YKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgi+

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks